{"title":"Security Vulnerabilities and Mitigation Strategies for Application Development","authors":"Brunil Dalila Romero Marino, Hisham M. Haddad","doi":"10.1109/ITNG.2009.151","DOIUrl":"https://doi.org/10.1109/ITNG.2009.151","url":null,"abstract":"Anticipating and mitigating security threats is critical during software development. This work investigates security vulnerabilities and mitigation strategies to help software developers build secure applications. The work examines common vulnerabilities, and relevant mitigation strategies, from several perspectives, including the input environment used to supply the software with needed data, the internal data and structures used to store and retrieve the data, the algorithms and computations performed on the data, the outputs, and the extensibility and mobile software. Examining software security from these vantage points is the key to understanding the difficulty of producing secure software applications.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128335934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Engineering Challenges in Game Development","authors":"Christopher M. Kanode, Hisham M. Haddad","doi":"10.1109/ITNG.2009.74","DOIUrl":"https://doi.org/10.1109/ITNG.2009.74","url":null,"abstract":"In Software Engineering (SE), video game development is unique yet similar to other software endeavors. It is unique in that it combines the work of teams covering multiple disciplines (art, music, acting, programming, etc.), and that engaging game play is sought after through the use of prototypes and iterations. With that, game development is faced with challenges that can be addressed using traditional SE practices. The industry needs to adopt sound SE practices for their distinct needs such as managing multimedia assets and finding the “fun” in game play. The industry must take on the challenges by evolving SE methods to meet their needs. This work investigates these challenges and highlights engineering practices to mitigate these challenges.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128577835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. S. Marcondes, D. Fernandes, Denis Ávila Montini, P. M. Tasinaffo, Í. S. Vega, L. Dias
{"title":"Systematic and Formal Approach to get a Domain Specific Language","authors":"F. S. Marcondes, D. Fernandes, Denis Ávila Montini, P. M. Tasinaffo, Í. S. Vega, L. Dias","doi":"10.1109/ITNG.2009.265","DOIUrl":"https://doi.org/10.1109/ITNG.2009.265","url":null,"abstract":"This paper presents a systematic approach applied over State Machine (since it is a wide know model and easy to be used to formal specification) to improve the domain analysis procedure, besides been out of scope of this paper, this approach can also helps to improve the enterprise's business process as well. The motivation which leads to the this paper is how to got a Domain Specific Language (DSL) that is completely correspondent to a Domain Analysis sharing both the same business rules. This is a very important property to be achieved since a DSL must be used to help the codding procedure in a specific domain, so, it must be a direct relation over them and this relation is explored in this paper. It has a briefly discussion over the need for formalization procedures concluding that too much formalization can be a problem and lack of it can also be, so, formal transformations can be performed at mark point (as baselines or any other mark that can be defined) bringing important contributions to the rigor of the model improving it.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128664122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elham Ziaei Pour, A. Taghizadeh, F. Bazazan, F. Khoshalhan, Ayoub Mohammadian
{"title":"A Model for National E-readiness Assessment Based on System Approach","authors":"Elham Ziaei Pour, A. Taghizadeh, F. Bazazan, F. Khoshalhan, Ayoub Mohammadian","doi":"10.1109/ITNG.2009.206","DOIUrl":"https://doi.org/10.1109/ITNG.2009.206","url":null,"abstract":"Main goal of this research is proposing an innovative scientific model for nationwide e-readiness assessment, proposed model including several levels, aim to reach the success factors and target customer groups, with enabling values. Through the research and from systematic point of view, e-readiness is a concept which includes all environmental effects, incoming, processing and outgoing phases of a national system. Value creation is another concept which includes all the outcomes and impacts of ICT adoption in the heart of e-Readiness and plays an important role in E-readiness assessment process. This comprehensive look to the ICT makes sense if we consider a system more e-Ready when it has more e-Ready incomes, process and outcomes than its competitors and eventually with increasing its adoption, makes more effective results in Business, government, citizenship, macro-economy, social, cultural and political aspects of the community. One of the advantages of proposed model is strongly attention to the role of specific countries features in national, industrial, organizational and individuals level to make proper assessment of e-Readiness and provide better opportunities with emphasis on E-business with special attention to the e-service adoption, and impacts of deploying these services in society","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Cryptography: A New Generation of Information Technology Security System","authors":"M. Sharbaf","doi":"10.1109/ITNG.2009.173","DOIUrl":"https://doi.org/10.1109/ITNG.2009.173","url":null,"abstract":"Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote \"Conjugate Coding\", which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of quantum cryptography, and the real–world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks","authors":"Y. Wu, Do Hyeon Lee, Jae-il Jung","doi":"10.1109/ITNG.2009.87","DOIUrl":"https://doi.org/10.1109/ITNG.2009.87","url":null,"abstract":"In this paper, the link maintenance probability that the two relay nodes in mobile ad hoc networks (Manet) communicates for a certain time was derived according to the initial distance between two relay node and speed of each node. Based on the link maintenance probability we further derived the route maintenance probability in multi hop Manet when the distance between source and destination node is given. Finally, we used Matlab to analyze the impact of distance between two adjacent relay nodes and communication time on link and route maintenance probability.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the Pair Programming Pedagogy to Support Remote Collaborations in CS Education","authors":"A. Shaw","doi":"10.1109/ITNG.2009.288","DOIUrl":"https://doi.org/10.1109/ITNG.2009.288","url":null,"abstract":"Pair programming has been shown to have demonstrable benefits in computer science education at collegiate levels. However, because it is an approach that involves two programmers working collaboratively at one computer, the model does not work as well when a project involves remote collaborators, or with teams of more than two students. In this paper, I outline an approach that is more appropriate for remote collaborations and that can involve teams with more than two members. Another problematic issue with pair programming is that one student in the pair can end up completing the lion’s share of a programming task even though during pair programming sessions students are supposed to voluntarily follow rules that equalize the programming effort. The remote approach outlined here involves a client-server management model that alleviates the problem of how to ensure a more equitable distribution of the collaborative tasks.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"36 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114115168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Btoush, J. Siddiqi, Ja'far Alqatawna, Babak Akhgar
{"title":"The State of Play in Jordanian E-government Services","authors":"M. Btoush, J. Siddiqi, Ja'far Alqatawna, Babak Akhgar","doi":"10.1109/ITNG.2009.115","DOIUrl":"https://doi.org/10.1109/ITNG.2009.115","url":null,"abstract":"This paper presents the major Information and Communication Technology (ICT) initiatives that have been taking place in Jordan and their effect in creating and promoting an e-culture within the Jordanian society. This is followed by an analysis of the Jordanian public e-services’ state of play using a previously proposed conceptual framework, the 6I maturity model, as a benchmark to gauge the maturity stage of these e-services, and to assess their perceptual effectiveness. This analysis is a part of a major field study which explores the perceptions of users’ and providers’ of the Jordanian public e-services. Overall, this paper concludes that most of the public e-services in Jordan are still in an early stage, and with the exception of a very few e-services, most of them have not obtained many of the expected outcomes that the rhetoric of national strategies has promised. Moreover, the study has confirmed through empirical investigation using the 6I maturity model that eservices do not necessarily evolve in stages of maturity as suggested by traditional maturity models.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114194684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN","authors":"Luo Juan, Luo Hai-bo, Li Ren-fa","doi":"10.1109/ITNG.2009.191","DOIUrl":"https://doi.org/10.1109/ITNG.2009.191","url":null,"abstract":"Multi-channel medium access control can fully utilize frequency resources of PHY layer, which can reduce interference and improve throughput. Aimed at clustered network, A virtual link based multi-channel MAC (VL-MAC) is proposed, which combines TDMA and FDMA. In VL-MAC, Cluster-heads schedule time-slots to achieve non-collision during intra-cluster communication. Inter-cluster communication between cluster heads is based on “Common Channel Link (virtual link, VL)”. Virtual MIMO is also employed to solve severe collision problem induced by enormous data around Sink node. The simulation indicates interference, latency and energy consumption can be reduced in VL-MAC.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114007150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Reconfiguration Algorithm for Fast Continuous Query Processing","authors":"Christopher Kosecki, Joseph S. Gomes","doi":"10.1109/ITNG.2009.223","DOIUrl":"https://doi.org/10.1109/ITNG.2009.223","url":null,"abstract":"With increasing hardware capabilities and network capacity, applications operating on streams of data are becoming more prevalent in the computing industry. Used in areas from security such as packet-sniffing intrusion detection software packages to the financial world attempting to model the stock market to map out future trends, algorithms for processing these unbounded streams are growing in necessity. Traditional database management systems fall short, as they are limited to bounded data. Therefore, stream management systems are required, as well as algorithms to efficiently process these data streams. Furthermore, these algorithms must be agile, adaptive and suitable for a wide range of operating conditions. In this paper, we design a hybrid algorithm to find optimized join trees for continuous stream queries. Our experimental results show that this hybrid algorithm can generate more efficient join trees than its components under a wide range of varied conditions.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}